or part of this page is from "ELEMENTS OF FRASCA ROTARY ENGINE
© 1998 by Joseph F. Frasca
as a working tool.
If your using a computer
as one of the tools
for your work, it might be advisable to use a laptop rather than a
The laptop you can
conveniently put into a
burglar-proof safe for security, whereas a desktop ..... .
Use as much password
protection as possible
to protect your work.
You might find it
necessary to run multiple
operating systems on your computer to gain a suitable degree of
The less anyone knows
about the computer hardware
and software tools your using, the more difficult its going to be for
work and computer equipment to be modified.
You'll find that friends
and relatives can
be quite glib and informative when discussing their "inventor" friend.
The more information
saboteurs have before
entering your working environment, the more preparation they can make
the less time their nefarious activities will [ require ] ;
the smaller the likelihood they'll be caught.
If, while working on your
computer, you discover
errors recurring in your work that you've previously corrected, your
is being got to in some way or another.
The newer files
containing the work are being
downloaded and replaced with older files of the work with the file date
Using a CD-Recording
system - most manufactures
offer parallel port versions - to permanently store you files in a
form should eliminate this particular problem.
Large capacity, removable
disks with password protection also offer some protection against this
vulnerability; however, such a disk can be re-formatted, and rewritten
regardless its password protection.
Your comment on using the
disk after this type
of tampering might be:
" Damn! I'm getting
I put this disk away
without password protection."
your files before storage.
Using reasonably price
public key encryption
software40a to protect all your files affords further
for your computer work.
This type of encryption
software also permits
more secure E-mail and other type correspondence.
Encryption also permit's
the viable and inexpensive
use of the PTO Disclosure Document Program to legally establish the
of invention for your work.
Encrypt your work, print
out the encrypted
work (ASCII armored), and use the printout as your disclosure document
You can then submit via
the U.S. mail a Disclosure
Document which you might otherwise need to hand carry to the PTO.
If and when you file your
you'll need to make available to the patent examiner the software and
necessary to decrypt your DD.
Hopefully, the examiner
will tolerate this
You might check with your
patent attorney on
the acceptability of the [topic] methodology.